Essays about: "video encryption"
Showing result 1 - 5 of 11 essays containing the words video encryption.
-
1. Evaluation of Using the WebRTC Protocol as a Fully Distributed System : Measure, benchmark, and evaluate the performance of the WebRTC protocol
University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)Abstract : Syftet med detta examensarbete är att och utvärdera undersöka analysera och utvärdera prestandan hos WebRTC-protokollet, samt att utveckla en webbaserad klient med hjälp av JavaScript för distribuerade system och demonstrera protokollets användbarhet i ett verkligt scenario. Studien inkluderade användning av olika verktyg och bibliotek, såsom Socket. READ MORE
-
2. Towards Video Secure Streaming - Feasibility Study of Using an Obscuring Algorithm in Conjunction of H.264 Encoding and Compression
University essay from Blekinge Tekniska Högskola/Institutionen för teknik och estetikAbstract : Technology advancement increases the usage of the internet day by day. One of the most used internet services is video streaming. The major advantage of video streaming is that it allows long distance communication between people without any delay. READ MORE
-
3. Ethical Hacking of a Smart Video Doorbell
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid development of IoT, more and more cyber security threats occur in people’s lives. In addition, many IoT devices are closely related to lives and have a large number of users, such as smart home. Therefore, it is more worthy for the adversaries to launch attacks. READ MORE
-
4. Generation of random numbers from the text found in tweets
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Random numbers are integral to many areas of computer science, it is used in everything from video games to encryption of important messages and simulations. These numbers are often generated by mathematical algorithms and it is highly important for these generators to generate numbers that are truly random and unpredictable, as patterns, cycles or other discrepancies might at worst cause serious security flaws that can be exploited. READ MORE
-
5. Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256
University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystemAbstract : The emerging topic, symmetric encryption technique for digital imagesusing chaotic function and DNA bases has recently drawn a lot ofattentions from the research community. The use of voice and visualmaterial as an addition to textual data has become more widespread. READ MORE